Month: January 2023

Microsoft researchers recently announced VALL-E, a new text-to-speech AI model that can accurately mimic a person’s voice when given a three-second audio sample. Once it has learned a specific voice, VALL-E can synthesise audio of that person saying anything—while attempting to retain the speaker’s emotional tone. When combined with other generative AI models like GPT-3,
0 Comments
Jan 10, 2023Ravie LakshmananPrivacy / Encryption A comprehensive analysis of the cryptographic protocols used in the Swiss encrypted messaging application Threema has revealed a number of loopholes that could be exploited to break authentication protections and even recover users’ private keys. The seven attacks span three different threat models, according to ETH Zurich researchers Kenneth
0 Comments
WhatsApp, the Meta-owned instant messaging app, is reportedly working on a new report status update feature for Android beta. This will enable users to report any unwanted status update violating the company’s Terms of Service on their Android phones. The Meta-owned messaging service is also testing this feature for a future update of its desktop
0 Comments
Jan 09, 2023The Hacker NewsSaaS Security / SSPM Solution Earlier this year, threat actors infiltrated Mailchimp, the popular SaaS email marketing platform. They viewed over 300 Mailchimp customer accounts and exported audience data from 102 of them. The breach was preceded by a successful phishing attempt and led to malicious attacks against Mailchimp’s customers’ end
0 Comments
Fire-Boltt Infinity smartwatch has been launched in India. The latest smartwatch from the Indian company sports a 1.6-inch HD display with 400×400 pixel resolution, and features Bluetooth calling. The Fire-Boltt Infinity smartwatch comes with support for more than 300 sports modes and over 110 inbuilt watch faces. It also has sensors that can track health
0 Comments
Jan 09, 2023Ravie LakshmananKubernetes / Cryptojacking The threat actors behind the Kinsing cryptojacking operation have been spotted exploiting misconfigured and exposed PostgreSQL servers to obtain initial access to Kubernetes environments. A second initial access vector technique entails the use of vulnerable images, Sunders Bruskin, security researcher at Microsoft Defender for Cloud, said in a report
0 Comments
The US Supreme Court on Monday let Meta Platforms’s WhatsApp pursue a lawsuit accusing Israel’s NSO Group of exploiting a bug in the WhatsApp messaging app to install spy software allowing the surveillance of 1,400 people, including journalists, human rights activists and dissidents. The justices turned away NSO‘s appeal of a lower court’s decision that the
0 Comments
With hybrid model empowering employees to work remotely and ensuring business continuity for enterprises, the use of unregistered devices by employees to access work platforms is adding new security challenges for organisations in India, according to a new survey by Cisco. The scenario is further complicated as employees are logging into work from multiple networks
0 Comments